“Until now, publicly known details of the attack were largely limited to its use of a self-injecting rootkit—Phalanx or Phalanx2—to infect kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The malware had access to potentially sensitive information stored on the infected machines. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers. According to Eset, kernel.org servers were probably infected by a second piece of malware dubbed Linux/Ebury, an OpenSSH backdoor used to keep control of the servers and steal credentials.”
Related posts:
Vida Cannabis: Positioned for Powerful Profit Potential
Why Facebook Would Have Banned Alexander Hamilton and Benjamin Franklin
NY Times Peddles War Propaganda: Interview with Daniel Simpson
Cheap Printing vs. Expensive Drilling
'Asset forfeiture' laws designed to strip criminals of assets target innocent homeowners
Edward Snowden: The Untold Story
Prison labor booms in US as low-cost inmates bring billions
Chemicals found in Syrian rebel facility were from Saudi Arabia
Chinese can now buy real estate with Bitcoin
NASA slams spending cuts that put Earth at risk of undetected killer asteroids
Consumer demand for gold jumps 53%
Caitlin Long: Vulnerability of Fed’s Balance Sheet
Capital Punishment for Traffic Violations
Grand Experiment Goes Live: Overstock.com Now Accepting Bitcoins
Georgia Tech Online Master’s Degree in Computer Science: $7,000